Background of Case study:
You work in
the IT department of a small organisation, Central ImagiLife employing 18 staff
(excluding the IT staff), and a large number of causals in the sales department,
which at times can run into around 100 sales staff. Your organisation deals with Life Insurance,
and carries a large brokerage team in the sales.
Your office
sits on Level 30, 35 St Georges Terrace, on a 500 sq m space area. The organisation has a number of sections
including Management and Training team, the Operations Team, the marketing and
support Team, the Accounts Team, the Compliance Team. The company has one IT lead and two other IT
Support staff.
The IT assets
consist of three routers (CISCO1841), of which one is meant for
redundancy. You have three legacy
switches (Cisco SRW2008 8-Port Gigabit Switch) in the office. The switches and routers sits on a trolley
rack in a room shared by the IT lead, maintenance and cleaners. There are also two Ubiquiti UniFi Access
Points, which are ceiling mounted in the clear view of anyone in the office.
The company
has twenty-four workstations, with i5 core processors, spread out amongst all
the departments. Most of the machines
are used by the in-house staff but there are four workstations that are
allocated to the sales staff. All
systems runs on a Domain, managed the AD.
The machines used by the sales staff break down very often, cause
lock-out because of wrong password etc.
Often, these machines are also infected by viruses, and sometimes the
sales staff will watch movies on the machines when they have some free time.
The company
runs a local Web Server on a Dell R610, which is outsourced for management to a
small local IT company, Asterisk Consultancy, which does the content
management, analytics reporting and security management. Asterisk also provides off-site backup for
the company’s compliance depository as part of legislative requirements.
Otherwise,
the company runs and manages it’s own IT assets and more importantly manages
it’s own file server and uses Speedview to manage their documents and
compliance documentations. The file
Server is deployed on another enhanced Dell R610 machine. Both the servers sit in a room shared by the
IT lead, maintenance and cleaners.[Learn about Virtual Private Network]
One of the
bigger issue is the sales staff, who would normally BYOD, creating lots of
issues for the IT staff on compatibility issues as well as security policy
breaches. The sale staff can get abusive
at times because of the inability to gain access to services.
Assessment Tasks:
You will conduct a research on the security
posture of the company, and if necessary work with Asterisk Consultancy. You will propose a possible network and
system diagram to show how a workable system may look like for Central ImagiLife. You will also put in specific recommendations
to improve on troubleshooting of equipment, system and software faults. You will also look into the security of the
IT infrastructure. You will cover these
and present the information in a simple report not exceed five pages, with clear headings and sub-headings to simplify
reading.[Read about System Development User Manual]
Task 1: Mapping the current system
List down all the equipment that Central
ImagiLife may have based on the narrative given in the Background of the Case Study.
Propose a probable workable network and
system that could be in existent for Central ImagiLife. Include as much details as possible. Diagrams and simple explanations suffices
here.
Task 2: Report on Issues, Maintenance, Preventive actions
In particular, you will cover the following
areas:
1.
Physical security of the hardware
equipment in relationship to risk and access
2.
Document the security settings
of the Networking equipment and provide
specific codes (CISCO CLI commands) on how the equipment should be secured.
3.
Develop a specific strategy
including specific symptoms on
hardware, operating system and printer problems.
4.
Develop recommended procedure to help staff achieve
self-help when they get into trouble.
5.
Provide a rollback procedure/strategy to get the staff to self-help rather
than rely on IT helpdesk.
6.
Develop a preventive maintenance strategy to prevent issues from occurring
7.
Develop specific IT Policies and Procedures to prevent further abuses of the system.
Due Week 14
Programming Assignment
Help provides plagiarism
free assignments i.e. all our solutions are genuine and written by best
technical assignment writers who have years of experience. Get
a quote now.
No comments:
Post a Comment